This dashboard tracks my progress across the SY0-701 exam objectives. Each objective links to a dedicated notes page and carries a simple status badge.
4
Done
0
In progress
0
Review
24
Pending
28
Total
14% complete — 4 of 28 objectives
1.0 General Security Concepts (12%)
| Objective | Title | Status | Link | Official |
|---|---|---|---|---|
| 1.1 | Compare and contrast various types of security controls. | done | View notes | Official PDF PDF p.4 |
| 1.2 | Summarize fundamental security concepts. | done | View notes | Official PDF PDF p.4 |
| 1.3 | Explain the importance of change management processes and the impact to security. | done | View notes | Official PDF PDF p.5 |
| 1.4 | Explain the importance of using appropriate cryptographic solutions. | done | View notes | Official PDF PDF p.5 |
2.0 Threats, Vulnerabilities, and Mitigations (22%)
| Objective | Title | Status | Link | Official |
|---|---|---|---|---|
| 2.1 | Compare and contrast common threat actors and motivations. | pending | View notes | Official PDF PDF p.6 |
| 2.2 | Explain common threat vectors and attack surfaces. | pending | View notes | Official PDF PDF p.6 |
| 2.3 | Explain various types of vulnerabilities. | pending | View notes | Official PDF PDF p.7 |
| 2.4 | Given a scenario, analyze indicators of malicious activity. | pending | View notes | Official PDF PDF p.7 |
| 2.5 | Explain the purpose of mitigation techniques used to secure the enterprise. | pending | View notes | Official PDF PDF p.7 |
3.0 Security Architecture (18%)
| Objective | Title | Status | Link | Official |
|---|---|---|---|---|
| 3.1 | Compare and contrast security implications of different architecture models. | pending | View notes | Official PDF PDF p.8 |
| 3.2 | Given a scenario, apply security principles to secure enterprise infrastructure. | pending | View notes | Official PDF PDF p.8 |
| 3.3 | Compare and contrast concepts and strategies to protect data. | pending | View notes | Official PDF PDF p.9 |
| 3.4 | Explain the importance of resilience and recovery in security architecture. | pending | View notes | Official PDF PDF p.9 |
4.0 Security Operations (28%)
| Objective | Title | Status | Link | Official |
|---|---|---|---|---|
| 4.1 | Given a scenario, apply common security techniques to computing resources. | pending | View notes | Official PDF PDF p.10 |
| 4.2 | Explain the security implications of proper hardware, software, and data asset management. | pending | View notes | Official PDF PDF p.10 |
| 4.3 | Explain various activities associated with vulnerability management. | pending | View notes | Official PDF PDF p.11 |
| 4.4 | Explain security alerting and monitoring concepts and tools. | pending | View notes | Official PDF PDF p.11 |
| 4.5 | Given a scenario, modify enterprise capabilities to enhance security. | pending | View notes | Official PDF PDF p.12 |
| 4.6 | Given a scenario, implement and maintain identity and access management. | pending | View notes | Official PDF PDF p.12 |
| 4.7 | Explain the importance of automation and orchestration related to secure operations. | pending | View notes | Official PDF PDF p.13 |
| 4.8 | Explain appropriate incident response activities. | pending | View notes | Official PDF PDF p.13 |
| 4.9 | Given a scenario, use data sources to support an investigation. | pending | View notes | Official PDF PDF p.13 |
5.0 Security Program Management and Oversight (20%)
| Objective | Title | Status | Link | Official |
|---|---|---|---|---|
| 5.1 | Summarize elements of effective security governance. | pending | View notes | Official PDF PDF p.14 |
| 5.2 | Explain elements of the risk management process. | pending | View notes | Official PDF PDF p.14 |
| 5.3 | Explain the processes associated with third-party risk assessment and management. | pending | View notes | Official PDF PDF p.15 |
| 5.4 | Summarize elements of effective security compliance. | pending | View notes | Official PDF PDF p.15 |
| 5.5 | Explain types and purposes of audits and assessments. | pending | View notes | Official PDF PDF p.15 |
| 5.6 | Given a scenario, implement security awareness practices. | pending | View notes | Official PDF PDF p.16 |
Attribution: Exam objectives content © CompTIA. Source: SY0-701 Exam Objectives (v5.0).